Joe, a user, wants to send Ann, another user, a confidential document electronically. Which of the following should Joe do to ensure the document is protected from eavesdropping?
A. Encrypt it with Joe’s private key
B. Encrypt it with Joe’s public key
C. Encrypt it with Ann’s private key
D. Encrypt it with Ann’s public key
Answer: D. Encrypt it with Ann’s public key
You might also like to view...
Identify three characteristics that Microsoft suggests for a strong password.
What will be an ideal response?
When transporting a cellular telephone as evidence you want to prevent anyone from making contact with the device. In order to do that, you store the phone in a __________________
a. Lead-lined container b. Box lined with aluminum foil c. Waterproof bag d. Faraday bag
All of the following are sections in a medical report except ____.
A. body B. heading C. reference D. conclusion
Which one of the following tag sets creates a table row?
a.